Results 61 to 70 of about 175 (163)
NTRU cryptosystem a solution to the quantum threat
Most of the current public key cryptosystems’ security is based on the integer factorization and the discrete logarithm, which are mathematical problems that are considered difficult to solve. However, the publication in 1994 of the Shor’s algorithm [1] was a major setback for the world of cryptography, since it provided a quantum algorithm capable of ...
Guiot Cusidó, Miquel +1 more
openaire +1 more source
The emergence of large-scale quantum computers threatens the long-term security of classical public-key cryptosystems, making the integration of post-quantum cryptography (PQC) essential for resource-constrained embedded and IoT platforms.
Tri-Duc Ta +3 more
doaj +1 more source
Enhancing the NTRU Cryptosystem
Unnikrishnan Menon, Awnon Bhowmik
openaire +1 more source
A New NTRU-Type Public-Key Cryptosystem over the Binary Field
As the development of cloud computing and the convenience of wireless sensor netowrks, smart devices are widely used in daily life, but the security issues of the smart devices have not been well resolved. In this paper, we present a new NTRU-type public-key cryptosystem over the binary field.
Youyu Gu, Xiongwei Xie, Chunsheng Gu
openaire +1 more source
Proposed Development of NTRU Public Key Cryptosystem
As life progresses and develops, cryptography has become an indispensable science. The development of this science has given flexibility and security in exchanging information and data of various kinds by making it difficult for unauthorized persons to access them.
openaire +1 more source
Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism. [PDF]
Seyhan K, Akleylek S.
europepmc +1 more source
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]
Farooq S +6 more
europepmc +1 more source
On the NTRU public key cryptosystem
NTRU is a public key cryptosystem which was first introduced in 1996. It is a ring-based cryptosystem and its security relies on the complexity of a well-known lattice problem, i.e. shortest vector problem (SVP). There is no efficient algorithm known to solve SVP exactly in arbitrary high dimensional lattices.
openaire +1 more source
A systematic review of homomorphic encryption and its contributions in healthcare industry. [PDF]
Munjal K, Bhatia R.
europepmc +1 more source
A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications. [PDF]
Septien-Hernandez JA +3 more
europepmc +1 more source

